ABSTRACT
This paper focuses on designing incentive mechanisms for overlay multicast systems. Existing proposals on the problem are no longer able to provide proper incentives when rational users collude or launch sybil attacks. To overcome this key limitation, we propose a novel decentralized DCast multicast protocol and prove that it offers a novel concept of safety-net guarantee: A user running the protocol will always obtain at least a reasonably good utility despite the deviation of any number of rational users that potentially collude or launch sybil attacks.
- A. Hayrapetyan, E. Tardos, and T. Wexler. The effect of collusion in congestion games. In STOC, 2006. Google ScholarDigital Library
- I. Keidar, R. Melamed, and A. Orda. EquiCast: Scalable multicast with selfish users. In PODC, 2006. Google ScholarDigital Library
- H. C. Li, A. Clement, M. Marchetti, M. Kapritsos, L. Robison, L. Alvisi, and M. Dahlin. Flightpath: Obedience vs. choice in cooperative services. In OSDI, 2008. Google ScholarDigital Library
- H. C. Li, A. Clement, E. L. Wong, J. Napper, I. Roy, L. Alvisi, and M. Dahlin. BAR Gossip. In OSDI, 2006. Google ScholarDigital Library
- N. Tran, J. Li, and L. Subramanian. Collusion-resilient Credit-based Reputations for Peer-to-peer Content Distribution. In NetEcon, 2010. Google ScholarDigital Library
- H. Yu, P. B. Gibbons, and C. Shi. DCast: Sustaining Collaboration despite Rational Collusion. Technical Report TRA2/11, School of Computing, National University of Singapore, Feb 2011. Available at http://www.comp.nus.edu.sg/ yuhf/TRA2-11.pdf.Google Scholar
Index Terms
- Sustaining collaboration in multicast despite rational collusion
Recommendations
DCast: sustaining collaboration in overlay multicast despite rational collusion
CCS '12: Proceedings of the 2012 ACM conference on Computer and communications securityA key challenge in large-scale collaborative distributed systems is to properly incentivize the rational/selfish users so that they will properly collaborate. Within such a context, this paper focuses on designing incentive mechanisms for overlay ...
SybilGuard: defending against sybil attacks via social networks
SIGCOMM '06: Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communicationsPeer-to-peer and other decentralized,distributed systems are known to be particularly vulnerable to sybil attacks. In a sybil attack,a malicious user obtains multiple fake identities and pretends to be multiple, distinct nodes in the system. By ...
Comments